Coverart for item
The Resource Economics of information security and privacy III, Bruce Schneier, editor

Economics of information security and privacy III, Bruce Schneier, editor

Label
Economics of information security and privacy III
Title
Economics of information security and privacy III
Statement of responsibility
Bruce Schneier, editor
Title variation
Economics of information security and privacy 3
Contributor
Subject
Genre
Language
eng
Summary
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
Cataloging source
GW5XE
Dewey number
005.8
Index
no index present
Language note
English
LC call number
QA76.9.A25
LC item number
E26 2013
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
NLM call number
QA 76.9.A25
http://library.link/vocab/relatedWorkOrContributorDate
1963-
http://library.link/vocab/relatedWorkOrContributorName
Schneier, Bruce
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • Internet
  • Computer Security
  • Economics
  • Internet
  • COMPUTERS / Security / General
  • Computer Science
  • Systems and Data Security
  • Business and Management, general
  • Computer Communication Networks
  • Data Structures, Cryptology and Information Theory
  • Computer Systems Organization and Communication Networks
Label
Economics of information security and privacy III, Bruce Schneier, editor
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • The Inconvenient Truth About Web Certificates
  • Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux
  • Resilience of the Internet Interconnection Ecosystem
  • Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios
  • Modeling Internet-Scale Policies for Cleaning up Malware
  • Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle
  • Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach
  • Christos Ioannidis, David Pym and Julian Williams
  • Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
  • Brent Rowe and Dallas Wood
  • The Impact of Immediate Disclosure on Attack Diffusion and Volume
  • Economic Methods and Decision Making by Security Professionals
  • Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al.
  • Real Name Verification Law on the Internet: A Poison or Cure for Privacy?
  • Daegon Cho
  • The Privacy Landscape: Product Differentiation on Data Collection
  • Sören Preibusch and Joseph Bonneau
  • Sam Ransbotham and Sabyasachi Mitra
  • Where Do All the Attacks Go?
  • Dinei Florêncio and Cormac Herley
  • Sex, Lies and Cyber-Crime Surveys
  • Dinei Florêncio and Cormac Herley
  • The Underground Economy of Fake Antivirus Software
  • Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al.
Control code
811840756
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9781461419815
Lccn
2012944738
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-1-4614-1981-5
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)811840756
Label
Economics of information security and privacy III, Bruce Schneier, editor
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • The Inconvenient Truth About Web Certificates
  • Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux
  • Resilience of the Internet Interconnection Ecosystem
  • Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios
  • Modeling Internet-Scale Policies for Cleaning up Malware
  • Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle
  • Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach
  • Christos Ioannidis, David Pym and Julian Williams
  • Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
  • Brent Rowe and Dallas Wood
  • The Impact of Immediate Disclosure on Attack Diffusion and Volume
  • Economic Methods and Decision Making by Security Professionals
  • Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al.
  • Real Name Verification Law on the Internet: A Poison or Cure for Privacy?
  • Daegon Cho
  • The Privacy Landscape: Product Differentiation on Data Collection
  • Sören Preibusch and Joseph Bonneau
  • Sam Ransbotham and Sabyasachi Mitra
  • Where Do All the Attacks Go?
  • Dinei Florêncio and Cormac Herley
  • Sex, Lies and Cyber-Crime Surveys
  • Dinei Florêncio and Cormac Herley
  • The Underground Economy of Fake Antivirus Software
  • Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al.
Control code
811840756
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9781461419815
Lccn
2012944738
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-1-4614-1981-5
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)811840756

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...